[ubuntu/xenial-security] gst-plugins-base1.0 1.8.3-1ubuntu0.2 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Mon Mar 27 17:03:33 UTC 2017
gst-plugins-base1.0 (1.8.3-1ubuntu0.2) xenial-security; urgency=medium
* SECURITY UPDATE: DoS in windows_icon_typefind
- debian/patches/CVE-2016-9811.patch: add bounds check in
gst/typefind/gsttypefindfunctions.c.
- CVE-2016-9811
* SECURITY UPDATE: DoS in gst_riff_create_audio_caps
- debian/patches/CVE-2017-5837.patch: check for valid channels/rate in
gst-libs/gst/riff/riff-media.c.
- CVE-2017-5837
* SECURITY UPDATE: DoS in gst_riff_create_audio_caps
- debian/patches/CVE-2017-5839.patch: fix infinite recursion in
gst-libs/gst/riff/riff-media.c.
- CVE-2017-5839
* SECURITY UPDATE: DoS in html_context_handle_element
- debian/patches/CVE-2017-5842.patch: check for non-zero length in
gst/subparse/samiparse.c.
- CVE-2017-5842
* SECURITY UPDATE: DoS in gst_riff_create_audio_caps
- debian/patches/CVE-2017-5844.patch: fix divide by zero in
gst-libs/gst/riff/riff-media.c.
- CVE-2017-5844
gst-plugins-base1.0 (1.8.3-1ubuntu0.1) xenial; urgency=medium
* No-change backport from yakkety to 16.04 (LP: #1619600)
gst-plugins-base1.0 (1.8.3-1ubuntu1) yakkety; urgency=medium
* Merge from Debian unstable. Remaining changes:
+ 0001-riff-Add-input-buffer-size-to-GstCaps.patch: Take patch from
Alfonso Sanchez-Beato on upstream bug #737599 to add a field in the
GstCaps containing the suggested buffer size for this stream.
+ Update Vcs-* for Ubuntu
gst-plugins-base1.0 (1.8.3-1) unstable; urgency=medium
* New upstream bugfix release.
Date: 2017-03-24 13:41:24.877755+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.8.3-1ubuntu0.2
-------------- next part --------------
Sorry, changesfile not available.
More information about the Xenial-changes
mailing list